frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

The Unintended Consequences of Well-Meaning Activism in Chico, California

https://blog.8thseat.com/the-unintended-consequences-of-well-meaning-activism-in-chico-california/
1•donsupreme•30s ago•0 comments

OpenAI AgentKit vs. Google ADK vs. Inngest: Comparison

https://www.agent-kits.com/2025/10/comparisonsopenai-agentkit-vs-google-adk-vs-inngest.html
1•agentica•41s ago•0 comments

Alpine Ajax: Radio Controlled HTML Elements

https://alpine-ajax.js.org/
1•vemy•43s ago•0 comments

More on the buyer/seller gap in AI

https://substack.com/inbox/post/176356993
1•mathattack•1m ago•0 comments

Claude Code vs. Codex: I Built a Sentiment Dashboard from 500 Reddit Comments

https://www.aiengineering.report/p/claude-code-vs-codex-sentiment-analysis-reddit
1•waprin•2m ago•0 comments

Renting a San Francisco Apartment in the A.I. Boom? Good Luck

https://www.nytimes.com/2025/10/16/technology/san-francisco-rent-ai-boom.html
1•mikhael•4m ago•0 comments

I Bypassed Amazon's Kindle Web DRM Because Their App Sucked

https://blog.pixelmelt.dev/kindle-web-drm/
2•pixelmelt•6m ago•0 comments

Post-POSIX Manifest

https://rentry.co/g7aofwhc
1•carlos256•10m ago•0 comments

Sci-Fi Meets Eldritch Horror in Deck Builder Chaos Zero Nightmare

https://www.animenewsnetwork.com/convention/2025/tokyo-game-show/sci-fi-meets-eldritch-horror-in-...
1•PaulHoule•10m ago•0 comments

Audrey Tang awarded for advancing social use of technology to empower citizens

https://rightlivelihood.org/the-change-makers/find-a-laureate/audrey-tang/
2•smartmic•12m ago•0 comments

A Curiosity Test for Finding the Right People for Your Community

https://www.deadpmsociety.com/
1•Nathanngai•12m ago•1 comments

Storing TOTP in Password Managers

https://iamvishnu.com/posts/totp-inside-password-manager
2•vishnuharidas•17m ago•0 comments

Dead or Alive, Ninja Gaiden creator Itagaki passed away at 58

https://www.gamedeveloper.com/design/dead-or-alive-creator-tomonobu-itagaki-has-passed-away-at-58
2•leshokunin•21m ago•2 comments

Growth teams are going offline?

https://josephbath.substack.com/p/offline-outbound
2•JosephBath•25m ago•0 comments

The consumer experience of AI-mediated news

https://radicallyinformed.substack.com/p/an-ai-enlightenment-the-consumer
2•heyimada•27m ago•0 comments

Chinese cyberspies snoop on Russian IT biz in rare east-on-east attack

https://www.theregister.com/2025/10/16/chinese_russian_cyber_espionage/
3•rntn•28m ago•0 comments

Explore OpenSearch 3.3

https://opensearch.org/blog/explore-opensearch-3-3/
1•mooreds•29m ago•0 comments

How to trick an application into thinking its stdout is a terminal, not a pipe

https://stackoverflow.com/questions/1401002/how-to-trick-an-application-into-thinking-its-stdout-...
1•RyanShook•29m ago•0 comments

Lakehouses viable for low-cost observability?

https://clickhouse.com/blog/lakehouses-path-to-low-cost-scalable-no-lockin-observability
1•thesystemisbust•30m ago•0 comments

When you opened a screen shot of a video in Paint, the video was playing in it

https://devblogs.microsoft.com/oldnewthing/20251014-00/?p=111681
2•birdculture•31m ago•0 comments

The Parable of the Talents

https://slatestarcodex.com/2015/01/31/the-parable-of-the-talents/
2•kaladin-jasnah•33m ago•0 comments

DPRK Adopts EtherHiding: Nation-State Malware Hiding on Blockchains

https://cloud.google.com/blog/topics/threat-intelligence/dprk-adopts-etherhiding
1•gnabgib•35m ago•0 comments

Show HN: We priced basic needs in work hours (global ranking and CSVs)

https://www.thepricer.org/hours-to-afford-essentials-best-and-worst-countries/
9•mickeymounds•35m ago•10 comments

Specialization Is for Insects

https://staysaasy.com/strategy/2025/10/16/specialization.html
2•gpi•35m ago•0 comments

Large RCT finds GenAI integration boosts revenues 0% – 16%

https://arxiv.org/abs/2510.12049
1•keeda•36m ago•1 comments

Benjie's Humanoid Olympic Games

https://generalrobots.substack.com/p/benjies-humanoid-olympic-games
18•robobenjie•37m ago•9 comments

Show HN: Arky – Visual 2D Markdown editor (access codes in comments)

https://app.arky.so
1•masonkim25•38m ago•1 comments

Picasso painting vanishes en route to Spanish exhibition

https://www.barrons.com/news/picasso-painting-vanishes-en-route-to-spanish-exhibition-6f939a98
2•domofutu•38m ago•0 comments

The Parallel Task MCP Server

https://parallel.ai/blog/parallel-task-mcp-server
3•lukaslevert•41m ago•1 comments

He's 58 and Trying to Break into College Football

https://www.wsj.com/sports/football/58-year-old-college-football-player-tom-cillo-lycoming-8271aa03
5•domofutu•41m ago•1 comments
Open in hackernews

Enabling port forwarding over SSH when it's "administratively prohibited"

https://blog.computers.pictures/mysql-ssh/
5•nticompass•1d ago

Comments

Bender•1d ago
No idea why they would do this, but they did.

Hardening in sshd_config to prevent arbitrary network access behind the firewall where the firewall would otherwise not permit. If one can get around this then the host itself may be missing proper outbound owner-based firewall rules varies by compliance requirements.

nticompass•1d ago
I'd understand if there was a firewall rule to prevent me from port forwarding to another machine on the same network, but this is the same machine (localhost).
Bender•1d ago
That is the hardening I was referring to in sshd [1] itself. I updated my comment to clarify sshd_config. Without specifying permitopen and permitlisten one could for example access a service that for whatever reason does not use proper access and authentication controls such as an old installation of reddis listening on 127.0.0.1:6379. Something else to read up on is PermitTunnel and the global forwarding option of AllowTcpForwarding and AllowStreamLocalForwarding. Beyond that another thing to research is MaxSessions which can be abused by phishers that get a shell on ones laptop and facilitating the unlogged bypass of MFA/2FA.

Another option to read up on is "Match" which can modify options for specific users, groups, networks or ports. For example we can disable port forwarding for Bob and enable port forwarding for Alice.

To further limit what that host can talk to one can use the Netfilter "owner" module to limit outbound connections by user or group. So for example only the LDAP user can talk to the LDAP server.

    # sshd -T | grep permit[l-o]
    permitopen 10.10.1.1:80
    permitlisten 10.10.1.1:80
Each org may have different audit and regulatory requirements that determine which if any of these options are utilized. Development orgs and small startups rarely use any of them due to perception of friction.

[1] - https://man7.org/linux/man-pages/man5/sshd_config.5.html

nticompass•8h ago
I guess I don't know all the settings/permissions that SSH can do. I assumed that once I was connected, I could just do whatever I wanted (or whatever my user had permission to do). Thanks for the information!